Professional Documents
Culture Documents
IP Spoofing demonstration
2. 2. Top-k Query Processing and Malicious Node Identification Based on Node Grouping in
1. 1. A Fuzzy Logic based Clustering Algorithm for WSN to extend the Network Lifetime
(IEEE 2016).
2. 2. Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence
of
AVR-
Against
(IEEE 2016).
IV. NS2 based SDN
(IEEE 2016).
(IEEE 2016).
V. NS2 based VANET
2. 2. Dual Authentication and Key Management Techniques for Secure Data Transmission
in
3. 3. Performance Modeling and Analysis of the IEEE 802.11p EDCA Mechanism for VANET
(IEEE 2016).
VI. NS2 based BODY AREA NETWORK
1. 1. Anonymous Authentication for Wireless Body Area Networks With Provable Security
(IEEE 2016).
2. 2. Secure and Efficient Data Communication Protocol for Wireless Body Area Networks
(IEEE 2016).
VII. NS2 based PROTOCOL ANALYSIS
2. 2. Energy Efficient Direction-Based PDORP Routing Protocol for WSN (IEEE 2016).
VIII. NS2 based UNDERWATER SENSOR NETWORK
Multi-